The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Metadata Harvesting (OAI2)
  • Digital Archiving Policy
  • Promote your Publication

IJACSA

  • About the Journal
  • Call for Papers
  • Author Guidelines
  • Fees/ APC
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Guidelines
  • Fees
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Editors
  • Reviewers
  • Subscribe

IJACSA Volume 1 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: A New Approach for Handling Null Values in Web Server Log

Abstract: The web log data embed much of the user’s browsing behavior and the operational data generated through Internet end user interaction may contain noise. Which affect the knowledge based decision. Handling these noisy data is a major challenge. Null value handling is an important noise handling technique in relational data base system. In this work the issues related to null value are discussed and null value handling concept based on train data set is applied to real MANIT web server log. A prototype system based on Fuzzy C-means clustering techniques with trained data set is also proposed in this work. The proposed method integrates advantages of fuzzy system and also introduces a new criterion, which enhances the estimated accuracy of the approximation. The comparisons between different methods for handling null values are depicted. The result shows the effectiveness of the methods empirically on realistic web logs and explores the accuracy, coverage and performance of the proposed Models.

Author 1: Pradeep Ahirwar
Author 2: Deepak Singh Tomar
Author 3: Rajesh Wadhvani

Keywords: Null value, web mining, k-means clustering, fuzzy C-means clustering, log records, log parser.

Download PDF

Paper 2: Traffic Classification – Packet-, Flow-, and Application-based Approaches

Abstract: Traffic classification is a very important mathematical and statistical tool in communications and computer networking, which is used to find average and statistical information of the traffic passing through certain pipe or hub. The results achieved from a proper deployment of a traffic analysis method provide valuable insights, including: how busy a link is, the average end-toend delays, and the average packet size. These valuable information bits will help engineers to design robust networks, avoid possible congestions, and foresee future growth. This paper is designed to capture the essence of traffic classification methods and consider them in packet-, flow-, and application-based contexts.

Author 1: Sasan Adibi

Keywords: Traffic Classification; Packet; Flow; Applications, Delay; Payload Size.

Download PDF

Paper 3: Algebraic Specifications:Organised and focussed approach in software development

Abstract: Algebraic specification is a formal specification approach to deal with data structures in an implementation independent way. Algebraic specification is a technique whereby an object is specified in terms of the relationships between the operations that act on that object. In this paper we are interested in proving facts about specifications, in general, equations of the form t1 = t2 , where t1 and t2 are members of term (S), being the signature of the specification. One way of executing the specification would be to compute the first algebra for the specification and then to check whether t1 and t2 belong in the same equivalence class. The use of formal specification techniques for software engineering has the advantage that we can reason about the correctness of the software before its construction. Algebraic specification methods can be used for software development to support verifiability, reliability, and usability. The main aim of this research work is to put such intuitive ideas into concrete setting in order for better quality product.(...)

Author 1: Rakesh L
Author 2: Dr. Manoranjan Kumar singh

Keywords: Abstract data types (ADTs), Formal-Methods, Abstraction, Equational reasoning, Symbolic computation.

Download PDF

Paper 4: Evaluating the impact of information systems on end user performance: A proposed model

Abstract: In the last decades, information systems (IS) researchers have concentrated their efforts in developing and testing models that help with the investigation of IS and user performance in different environments. As a result, a number of models for studying end users’ systems utilization and other related issues including system usefulness, system success and user aspects in business organizations have appeared. A synthesized model consolidating three well-known and widely used models in IS research is proposed. Our model was empirically tested in a sophisticated IS environment investigating the impacts of the enterprise recourse planning (ERP) systems on user perceived performance. Statistical analysis was performed including factors analysis and regression to test the model and prove its validity. The findings demonstrated that the proposed model performed well as most factors had direct and or indirect significant influences on user perceived performance suggesting therefore that the model possesses the ability to explain the main impacts of these factors on ERP users.

Author 1: Ahed Abugabah
Author 2: Louis Sanzogni
Author 3: Osama Alfarraj

Keywords: Information systems, user performance, task technology fit, technology acceptance model.

Download PDF

Paper 5: Network Anomaly Detection via Clustering and Custom Kernel in MSVM

Abstract: Multiclass Support Vector Machines (MSVM) have been applied to build classifiers, which can help Network Intrusion detection. Beside their high generalization accuracy, the learning time of MSVM classifiers is still a concern when applied into Network intrusion detection systems. This paper speeds up the learning time of MSVM classifiers by reducing the number of support vectors. In this study, we proposed KMSVM method combines the K-means clustering technique with custom kernel in MSVM. Experiments performed on KDD99 dataset using KMSVM method, and the results show that the KMSVM method can speed up the learning time of classifiers by both reducing support vectors and improve the detection rate on testing dataset.

Author 1: Arvind Mewada
Author 2: Shamila Khan
Author 3: Prafful Gedam

Keywords: IDS; K-mean; MSVM; RBF; KDD99, Custom Kernel

Download PDF

Paper 6: Iris Recognition System

Abstract: In a biometric system a person is identified automatically by processing the unique features that are posed by the individual. Iris Recognition is regarded as the most reliable and accurate biometric identification system available. In Iris Recognition a person is identified by the iris which is the part of eye using pattern matching or image processing using concepts of neural networks. The aim is to identify a person in real time, with high efficiency and accuracy by analysing the random patters visible within the iris if an eye from some distance, by implementing modified Canny edge detector algorithm. The major applications of this technology so far have been: substituting for passports (automated international border crossing); aviation security and controlling access to restricted areas at airports; database access and computer login.

Author 1: Neha Kak
Author 2: Rishi Gupta
Author 3: Sanchit Mahajan

Keywords: iris recognition, biometric identification, pattern recognition, segmentation

Download PDF

Paper 7: Radio Frequency Identification Based Library Management System

Abstract: Radio frequency identification (RFID) is a term that is used to describe a system that transfers the identity of an object or person wirelessly, using radio waves. It falls under the category of automatic identification technologies. This paper proposes RFID Based Library Management System that would allow fast transaction flow and will make easy to handle the issue and return of books from the library without much intervention of manual book keeping. The proposed system is based on RFID readers and passive RFID tags that are able to electronically store information that can be read with the help of the RFID reader. This system would be able to issue and return books via RFID tags and also calculates the corresponding fine associated with the time period of the absence of the book from the library database.

Author 1: Priyanka Grover
Author 2: Anshul Ahuja

Keywords: Radio frequency identification technology; RFID Readers; RFID Tags; Inductive Coupling

Download PDF

Paper 8: PC And Speech Recognition Based Electrical Device Control

Abstract: controlling of various appliances using PC. It consist a circuit for using the printer port of a PC, for control application using software and some interface hardware. The interface circuit along with the given software can be used with the printer port of any PC for controlling up to eight equipments. Parallel port is a simple and inexpensive tool for building computer controlled devices and projects. The simplicity and ease of programming makes parallel port popular.

Author 1: Sanchit Dua

Keywords: Electronic device controller, Diode, Transformer

Download PDF

Paper 9: [Survey Report] How WiMAX Will Deploy In India

Abstract: controlling of various appliances using PC. It consist a circuit for using the printer port of a PC, for control application using software and some interface hardware. The interface circuit along with the given software can be used with the printer port of any PC for controlling up to eight equipments. Parallel port is a simple and inexpensive tool for building computer controlled devices and projects. The simplicity and ease of programming makes parallel port popular.

Author 1: Rakesh Kumar Jha
Author 2: Dr Upena D Dalal

Keywords: Electronic device controller, Diode, Transformer

Download PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. Registered in England and Wales. Company Number 8933205. All rights reserved. thesai.org